Diagram decorative image

Cooperation is Key to Curbing Cyber Threats

As cybercriminals become more stealthy by using access to internet of things (IoT) devices to eventually breach sensitive data, information technology (IT) and operational technology (OT) teams need to work more closely to prevent attacks.

Historically, when it came to IT security, responsibility started with an IT team and ran all the way up the line to a Chief Information Officer (CIO) or Chief Information Security Officer (CISO) and eventually to the company’s Chief Executive Officer (CEO). According to Cybersecurity Practice Leader, Bryan Bennett, it may be time to expand this C-suite chain of responsibility. That is because “smart” building systems are becoming more integrated with IT systems than ever before. Bennett says previously ignored OT devices led to a false sense of security for many building managers.

Please accept statistics, marketing cookies to watch this video.

According to Bennett, the ambiguity surrounding the question of who should be responsible for cybersecurity must end. He believes companies will adopt the most appropriate reporting structure tailored to specific business practices. A manufacturing facility, for example, may focus extra attention on building systems with a robust OT team, while a more data-driven operation may choose to maintain a more traditional IT approach. In both cases, however, increasingly connected IoT devices must be accounted for to maintain information and operational technology cybersecurity.

International Data Corporation (IDC) predicts that by 2025 there will be over 55 billion connected devices worldwide with 75% integrated with an IoT platform. Bennett says this growing proliferation of connected devices demands a more robust security routine. He believes while companies will continue to support IT and OT daily operations, with one notable addition. There should also be a liaison working between the two groups to coordinate maintenance, updates, and mitigating risks. Should a cyber intrusion be detected, the IT team would immediately go into action to contain the attack.

This article was subsequently posted by leading industry publication Consulting-Specifying Engineer (CSE) magazine.

Bryan Bennett has been evangelizing for better IT security strategies for over a quarter-century. His mission to protect organizations from the financial, reputational, and individual costs associated with cybercrimes fits well with ESD’s mission to improve society through the built environment.


Related News

Interested in learning more? Check out these related news items.

Karnatz Joins Conference to Talk Building Operations Technology

Getting the most out of buildings—cost, speed to market, sustainability, user experience, wellness, and more—is the focus of “The Buildings Conference 2023” sponsored by BuiltWorlds. ESD President Kurt Karnatz joins a panel of professional peers as part of the two-day event starting May 18 in Chicago. (Learn more about BuiltWorlds conference.)

Is Your Smart Building an Easy Target for Hackers?

The latest building system technologies being adopted bring many benefits in terms of operational efficiencies, reduced environmental impact, and enhanced occupant experience. But these systems also introduce new vulnerabilities and present a much more tempting target for malicious actors seeking to launch cyberattacks. So do the benefits outweigh the risks, and how should potential vulnerabilities be addressed? (Learn more about cybersecurity.)

Can Intelligent Buildings Outsmart Hackers?

As building systems are increasingly more connected to the outside world, ESD Studio Leader and Senior Security Consultant Coleman Wolf says their vulnerability to cyber attacks is also growing. (Learn more about building system security.)